Review on Image Processing Based Adversarial Example Defenses in Computer Vision

被引:41
|
作者
Qiu, Meikang [1 ]
Qiu, Han [2 ]
机构
[1] Harrisburg Univ, Dept Comp Sci, Harrisburg, PA 17101 USA
[2] Inst Polytech Paris, Telecom Paris, LTCI, Palaiseau, France
来源
2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2020年
关键词
Deep learning; adversarial examples; image denoising; image compression; computer vision; ROBUSTNESS;
D O I
10.1109/BigDataSecurity-HPSC-IDS49724.2020.00027
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent research works showed that deep neural networks are vulnerable to adversarial examples, which are usually maliciously created by carefully adding deliberate and imperceptible perturbations to examples. Several states of the art defense methods are proposed based on the existing image processing methods like image compression and image denoising. However, such approaches are not the final optimal solution for defense adversarial perturbations in DNN models. In this paper, we reviewed two main approaches to deploying image processing methods as a defense. By analyzing and discussing the remaining issues, we present two open questions for future research direction including the definition of adversarial perturbations and noises, the novel defense-aware threat model. A further research direction is also given by re-thinking the impacts of adversarial perturbations on all frequency bands.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 50 条
  • [31] AN INVESTIGATION INTO THE EVALUATION AND OPTIMISATION METHOD OF ENVIRONMENTAL ART DESIGN BASED ON IMAGE PROCESSING AND COMPUTER VISION
    Wang, Hui
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2025, 26 (01): : 277 - 286
  • [32] Adversarial Machine Learning for Image-Based Radio Frequency Fingerprinting: Attacks and Defenses
    Papangelo, Lorenzo
    Pistilli, Maurizio
    Sciancalepore, Savio
    Oligeri, Gabriele
    Piro, Giuseppe
    Boggia, Gennaro
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (11) : 108 - 113
  • [33] How to Defend and Secure Deep Learning Models Against Adversarial Attacks in Computer Vision: A Systematic Review
    Dhamija, Lovi
    Bansal, Urvashi
    NEW GENERATION COMPUTING, 2024, 42 (05) : 1165 - 1235
  • [34] Impact of computer vision based secure image enrichment techniques on image classification model
    Rao, A. Shubha
    Mahantesh, K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03) : 899 - 911
  • [35] Adversarial Attacks on Deep Learning Models of Computer Vision: A Survey
    Ding, Jia
    Xu, Zhiwu
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT III, 2020, 12454 : 396 - 408
  • [36] VQAR: Review on Information Retrieval Techniques based on Computer Vision and Natural Language Processing
    Modi, Shivangi
    Pandya, Dhatri
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 137 - 144
  • [37] Application of image processing and analysis in selected industrial computer vision systems
    Fabijanska, Anna
    Kuzanski, Marcin
    Sankowski, Dominik
    Jackowska-Strumillo, Lidia
    PERSPECTIVE TECHNOLOGIES AND METHODS IN MEMS DESIGN, 2008, : 27 - +
  • [38] Towards Practical Computer Vision in Teaching and Learning of Image Processing Theories
    Alves, Lucas de O.
    Cruz, Luigi E.
    Saito, Priscila T. M.
    Bugatti, Pedro H.
    2019 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE 2019), 2019,
  • [39] Computer Vision Technology for Fault Detection Systems Using Image Processing
    Alghawli, Abed Saif
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 1961 - 1976
  • [40] Adversarial attacks and defenses in deep learning for image recognition: A survey
    Wang, Jia
    Wang, Chengyu
    Lin, Qiuzhen
    Luo, Chengwen
    Wu, Chao
    Li, Jianqiang
    NEUROCOMPUTING, 2022, 514 : 162 - 181